Question

In: Computer Science

Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What...

Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What are the technologies used for biometrics authentication?

Solutions

Expert Solution

Biometric Authentication, its security challenges and privacy implications, and the technologies used for biometric authentication:
Biometric authentication is one of the processes or ways of identifying, verifying, controlling access, and then realistically authenticating users to unlock, unblock, login, and access the systems, services, applications, devices, etc to which they are authorized to, using biometric parameters or factors such as, palm prints, fingerprints, voiceprints, DNA, retina scan, odor/scent, palm veins, face recognition, iris recognition, etc.

Biometric authentication technology is an emerging and booming one. Its applications are in security, software, IT, law enforcement, defense, health sector (hospitals), education, finance, banking, legal, entertainment, etc. fields, industries, or sectors. It is especially, used in surveillance to identify individuals amongst groups, people, or crowd.

On the other hand, from the abstract form perspective, unique behavioral characteristics of a person such as the pattern of behavior, and actions of an individual, such as his/her typing rhythm, gait, style, gestures, facial expressions, voice, etc., are considered biometric authentication factors. Hence, it requires a biological input scanning and analyzing the same, to be verified for the user to be authenticated to access something upon predefined permissions, privileges, authorization, and appropriate access control policies per his/her role.

Hence, it basically, depends on unique biological characteristics of an individual for him/her to access something been authorized to, thus verifying his identity, proving he/she is who he/she, respectively, claims to be.

As the name suggests, biometrics is a technical term, where "bio" is related to one's body and "metrics" refers to its and other human characteristics' measurements and calculations.

This biometric authentication is effective, unique, high level, and more secure than other old authentication mechanisms, and provides convenience to the users being authenticated and also the people or entities authenticating them.

The technologies used for biometric authentication are IT infrastructure such as computers, servers, biometric sensors for identity technology, high definition cameras and other systems for facial recognition, or microphones for voice capture/recording or speaker recognition technology, hand and finger geometry scanner, vein geometry scanner, eye scanners, especially iris scanners, fingerprint scanners such as optical, capacitive, and ultrasound, all the captured and analyzed data are stored in databases, and servers to process them, either on-premise data centers or on cloud.

It does come with serious privacy concerns of its own and also has security challenges. There is an absence of legal and regulatory requirements which is a challenge in the implementation of the proposed biometric solution, specifically with respect to biometrics implementation into smart cards. There is a security concern of saving, storing, or safeguarding, using, processing, and transferring biometric credentials and details.

Also, another security concern is of false negatives and false positives mistakes, and human and system errors. Also, virtually and physically, biometric credentials could be replicated or copied, stolen by hackers from the servers or storages, and also directly from users. Biometric credentials are difficult to keep them secret or hidden, and any and all stolen biometrics are hard to be revoked, modified, or changed.

Many users have privacy concerns of governments, systems, enterprises using their biometric credentials as, they are simply considered as one's personal data per Personally Identifiable Information (PII) policies and laws, and they do not want the details to provide and those shared with someone. Hackers hacking people's biometric credentials will affect severely in the users’ lives and privacy in a negative way, hurting, harming and bringing them all kinds of damages, loss, and even their death. The surveillance systems using biometric authentication and monitoring itself would ruin peoples' privacy.


Related Solutions

Write a research proposal about the impact of IoT Security and Privacy for home users. Give...
Write a research proposal about the impact of IoT Security and Privacy for home users. Give a Background to the Study, Scope, Assumption, and Limitations.
Write a research proposal about the impact of Biometrics Devices in Healthcare. Give a Background to...
Write a research proposal about the impact of Biometrics Devices in Healthcare. Give a Background to the Study, Aim, and Objectives of the study.
Modern technology has presented some challenges and some benefits to security and privacy. In your own...
Modern technology has presented some challenges and some benefits to security and privacy. In your own words discuss this statement in relation to legal and ethical issues, with examples that may affect an IT professional, to illustrate both challenges and benefits described in your answer.?
What are the main challenges to write the Introduction and Literature Review in an IT research?
What are the main challenges to write the Introduction and Literature Review in an IT research?
I need to research definitions of the terms privacy, confidentiality and security of health information to...
I need to research definitions of the terms privacy, confidentiality and security of health information to include in your post. As a health care manager, what responsibilities do you have to uphold these for your patients? Provide an example to illustrate your role and responsibility of protecting patient information.
Research a major (note the word major) security/ privacy breach that occurred in the healthcare or...
Research a major (note the word major) security/ privacy breach that occurred in the healthcare or public health domain in the last 5 years. Answer the following questions. What was the impact on patients? What could have been done to prevent it? What was the penalty / fine awarded to the healthcare organization?
Research a major (note the word major) security/ privacy breach that occurred in the healthcare or...
Research a major (note the word major) security/ privacy breach that occurred in the healthcare or public health domain in the last 5 years. Answer the following questions. What was the impact on patients? What could have been done to prevent it? What was the penalty / fine awarded to the healthcare organization?
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least...
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least 3 examples for each? 2) Please compare and contrast the following 4 Access Control Models and let me know how they work and give me an example of each. 1. Discretionary Access Control 2. Mandatory Access Control 3. Rule Based Access Controls 4. Role Based Access Controls
What are the effects of the pandemic implications for marketers? What are the challenges that they...
What are the effects of the pandemic implications for marketers? What are the challenges that they face and What is marketing analytics software and what is it used for?
Challenges in Implementing Physical Security. In your opinion what are the challenges in implementing physical security,...
Challenges in Implementing Physical Security. In your opinion what are the challenges in implementing physical security, this includes social engineering.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT